. Gartner, Gartner says 4.9 billion connected "things" will be in use in 2015, p.28, 2014.

B. Schneier, Lessons from the dyn ddos attack, 2016.

B. Herzberg, D. Bekerman, and I. Zeifman, Breaking down mirai: An iot ddos botnet analysis, p.29, 2016.

B. Krebs, Target hackers broke in via hvac company, p.29, 2014.

S. Faux, La sécuritésécurité`sécuritéà l'` ere des objets connectés: comment s'y prendre, Workshop "Sécurité des Objets Connectés, 2017.

, Hp study reveals 70 percent of internet of things devices vulnerable to attack, HP, vol.20, 2014.

, R` eglement général sur la protection des données, pp.32016-0679, 2016.

S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, Proposed security model and threat taxonomy for the internet of things (iot), pp.420-429, 2010.

B. Dorsemaine, J. Gaulier, J. Wary, N. Kheir, and P. Urien, Internet of things: a definition & taxonomy, Next Generation Mobile Applications, Services and Technologies, pp.72-77, 2015.

M. B. Barcena and C. Wueest, Insecurity in the internet of things, Security Response, 2015.

B. Caudill, Amazon key security: Cloudcam subject to disruption attacks, p.29, 2017.

N. Vidgren, K. Haataja, J. L. Patino-andres, J. J. Ramirez-sanchis, and P. Toivanen, Security threats in zigbee-enabled systems: vulnerability evaluation, practical experiments, countermeasures, and lessons learned, 46th Hawaii International Conference on, pp.5132-5138, 2013.

M. Vanhoef and F. Piessens, Key reinstallation attacks: Forcing nonce reuse in wpa2, Proceedings of the ACM Conference on Computer and Communications Security, vol.30, 2017.

C. Torano, Iot for kids: Cayla doll exploit, p.29, 2017.

D. Miorandi, S. Sicari, F. D. Pellegrini, and I. Chlamtac, Internet of things: Vision, applications and research challenges, Ad Hoc Networks, vol.10, issue.7, pp.1497-1516, 2012.